Perform research on the Internet to understand security threats and attack vectors in a Bring Your Own Device (BYOD) scenario. How could passive reconnaissance be done in this type of environment? What security controls would you recommend implementing to avoid this type of passive reconnaissance?
Competencies Measured
By successfully completing this assignment, you will demonstrate your proficiency in the following course competencies and assignment criteria.
- Competency 1: Describe the core concepts, technologies, components, and security issues related to mobile and wireless networks.
- Apply your internet research findings to analyze core concepts and applied technologies regarding security threats and attack vectors in a Bring Your Own Device (BYOD) context.
- Competency 3: Analyze how mobile systems operate to facilitate secure data access and voice.
- Describe performing passive reconnaissance on a target organization in a lab context.
- Recommend security controls to implement to avoid identified passive reconnaissance in a Bring Your Own Device (BYOD) context.
- Competency 4: Apply network defense tools to identify and mitigate mobile network security concerns.
- Complete the lab tasks as described in the lab learning objectives.
- Describe how passive reconnaissance can be applied in a Bring Your Own Device (BYOD) context.
- Competency 6: Exhibit proficiency in writing, critical thinking, and research topic areas in real-life data communication networks.
- Convey clear meaning through appropriate word choice and usage.
- Organize content so ideas flow logically with smooth transitions.